Indian Journal of Science and Technology
DOI: 10.17485/ijst/2016/v9i30/98717
Year: 2016, Volume: 9, Issue: 30, Pages: 1-4
Original Article
R. Bulli Babu* , Talatam Durga Rao and Tummala Harika
Department of Electronics and Computer Engineering, [email protected]
[email protected]
[email protected]
*Author for correspondence
Bulli Babu
Department of Electronics and Computer Engineering,
Email:[email protected]
Objective: The main motto of this work is to trace the cyber fraud people and moreover we had extended this work in multiple way usage in the forensic mode. Method: So in this method let us imagine a scenario in which something incorrectly happen on the server and on the off chance that if an association will misfortune some kind of information (means if an association will hack and misfortune some critical information. Yes this may happen, it may happen in light of the fact that an assailant more keen than an infiltration analyzer. So after this the time is to get the programmer, for this reason you require a scientific device, so in this article we will talk about DEFT Linux a complete distro for measurable purposes. Findings: The Digital Evidence and Forensic Toolkit or DEFT Linux, is a live distro that gives devices to investigating PC frameworks and gathering criminological confirmation. The distro contains apparatuses for scanning and breaking down circle drives, databases and system movement of Windows and Linux frameworks. Application: DEFT incorporates instruments to bolster Incident Response, Cyber Intelligence and Computer Forensics. It incorporates WINE and the Digital Advanced Response Toolkit (DART). The essential center of the distro is the precise and dependable gathering of proof for use in criminal procedures. Thus, most DEFT devices are arranged to gathering data without changing the framework being analyzed. And more over we had used FTK imager and Winhex, data recovery tools to find suspect. So, finally in this paper we are going to test an unapproved information with a planned results.
Keywords: DART, DEFT, Computer Forensic, Cyber Intelligence, Penetration
Subscribe now for latest articles and news.